Browsing by Subject Computer security

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 1 to 8 of 8
  • TVS.005271_TT_Zoubir Z. Mammeri - Cryptography_ Algorithms, Protocols, and Standards for Computer Security-Wiley (2024).pdf.jpg
  • Sách/Book


  • Authors: Mammeri, Zoubir (2024)

  • This book constitutes a comprehensive yet accessible introduction to the algorithms, protocols, and standards which protect the modern internet. Built around both foundational theories and hundreds of specific algorithms, it also incorporates the required skills in complex mathematics.The result is an indispensable introduction to the protocols and systems which should define cryptography for decades to come

  • TVS.005240_TT_Zahir Tari, Nasrin Sohrabi, Yasaman Samadi, Jakapan Suaboot - Data Exfiltration Threats and Prevention Techniques_ Machine Learning and.pdf.jpg
  • Sách/Book


  • Authors: Tari, Zahir (2023)

  • Data Exfiltration Threats and Prevention Techniques provides readers the knowledge needed to prevent and protect from malware attacks, raising awareness of the increasing number of attacks each year. Provided with a detailed description of the recent advances in data exfiltration detection methods and technologies, the authors discuss details of data breach countermeasures and attack scenarios to show how the reader may identify a potential cyber attack in the real world. Aimed at professionals and students alike, this book highlights a range of machine learning methods that can be used to detect potential data theft, identifying research gaps and the potential to make change in the f...

  • TVS.005248_TT_Shaurya Gupta, Kanta Prasad Sharma, Ashish Sharma, Dac-Nhuong Le - Evolving Networking Technologies_ Developments and Future Directions-.pdf.jpg
  • Sách/Book


  • Authors: - (2023)

  • This book discusses in a practical manner some of the critical security challenges facing the ever-evolving networking technologies of today. In an age of explosive worldwide growth of electronic data storage and communications, effective protection of information has become a critical requirement, especially when used in coordination with other tools for information security and cryptography in all of its applications, including data confidentiality, data integrity, and user authentication

  • TVS.000572_TT_ Rebekah Brown and Scott J. Roberts - Intelligence-Driven Incident Response, 2nd Edition (5th Early Release)-O_Reilly Media, Inc. (2023).pdf.jpg
  • Sách/Book


  • Authors: Rebekah Brown (2023)

  • The fundamentals: Get an introduction to cyberthreat intelligence, the intelligence process, the incident response process, and how they all work together Practical application: Walk through the intelligence-driven incident response (IDIR) process using the F3EAD process: Find, Fix, Finish, Exploit, Analyze, and Disseminate The way forward: Explore big-picture aspects of IDIR that go beyond individual incident response investigations, including intelligence team building

  • TVS.005245_TT_Ram Shankar Siva Kumar_ Hyrum Anderson - Not with a Bug, But with a Sticker _ Attacks on Machine Learning Systems and What To Do About T.pdf.jpg
  • Sách/Book


  • Authors: Siva Kumar, Ram Shankar (2023)

  • A robust and engaging account of the single greatest threat faced by AI and ML systems In Not With A Bug, But With A Sticker: Attacks on Machine Learning Systems and What To Do About Them, a team of distinguished adversarial machine learning researchers deliver a riveting account of the most significant risk to currently deployed artificial intelligence systems: cybersecurity threats.

  • TVS.005285_TT_Chris Hughes_ Tony Turner - Software Transparency_ Supply Chain Security in an Era of a Software-Driven Society-Wiley (2023).pdf.jpg
  • Sách/Book


  • Authors: Hughes, Chris (2023)

  • Discover the new cybersecurity landscape of the interconnected software supply chain In Software Transparency: Supply Chain Security in an Era of a Software-Driven Society, a team of veteran information security professionals delivers an expert treatment of software supply chain security. In the book, you'll explore real-world examples and guidance on how to defend your own organization against internal and external attacks

  • TVS.005216_TT_S. Sountharrajan_ R. Maheswar Geetanjali_ Rathee_ M. Akila - Wireless Communication for Cybersecurity-Wiley (2023).pdf.jpg
  • Sách/Book


  • Authors: - (2023)

  • This book allows readers to reach their solutions using various predictive algorithm-based approaches and some curated real-time protective examples that are defined herein. Artificial intelligence (AI) concepts are devised and proposed for helping readers understand the core concepts of efficiencies of threats, and the parallel solutions are covered. The chapters also state the challenges in privacy and security levels for various algorithms and various techniques and tools are proposed for each challenge.